Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification

被引:5
作者
Alhawi, Omar M. [1 ]
Mustafa, Mustafa A. [1 ,2 ]
Cordiro, Lucas C. [1 ]
机构
[1] Univ Manchester, Manchester, Lancs, England
[2] Katholieke Univ Leuven, IMEC, COSIC, Leuven, Belgium
来源
2019 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2019) | 2019年
关键词
UAV; Software Verification and Testing; Security;
D O I
10.1109/SIOT48044.2019.9637109
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of Unmanned Aerial Vehicles (UAVs) embedded with vulnerable monolithic software has recently raised serious concerns about their security due to concurrency aspects and fragile communication links. However, verifying security in UAV software based on traditional testing remains an open challenge mainly due to scalability and deployment issues. Here we investigate software verification techniques to detect security vulnerabilities in typical UAVs. In particular, we investigate existing software analyzers and verifiers, which implement fuzzing and bounded model checking (BMC) techniques, to detect memory safety and concurrency errors. We also investigate fragility aspects related to the UAV communication link. All UAV components (e.g., position, velocity, and attitude control) heavily depend on the communication link. Our preliminary results show that fuzzing and BMC techniques can detect various software vulnerabilities, which are of particular interest to ensure security in UAVs. We were able to perform successful cyber-attacks via penetration testing against the UAV both connection and software system. As a result, we demonstrate real cyber-threats with the possibility of exploiting further security vulnerabilities in real-world UAV software in the foreseeable future.
引用
收藏
页码:9 / 17
页数:9
相关论文
共 33 条
[1]  
Alhawi OmarMK., 2019, HDB BIG DATA IOT SEC, P301, DOI DOI 10.1007/978-3-030-10543-313
[2]  
Artzi Shay., 2008, P 2008 INT S SOFTWAR, P261, DOI DOI 10.1145/1390630.1390662
[3]  
Austin R., 2011, Unmanned Aircraft Systems: UAVs Design, Development and Deployment, DOI 10.1002/9780470664797
[4]   Automatic Verification of C and Java']Java Programs: SV-COMP 2019 [J].
Beyer, Dirk .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PT III, 2019, 11429 :133-155
[5]   Bounded model checking [J].
Biere, Armin .
Frontiers in Artificial Intelligence and Applications, 2009, 185 (01) :457-481
[6]  
BRITTON B., 2018, GATW AIRP DRON DISR
[7]  
CAA, 2018, CIV AV AUTH DRON SAF
[8]   DSVerifier-Aided Verification Applied to Attitude Control Software in Unmanned Aerial Vehicles [J].
Chaves, Lennon ;
Bessa, Iury V. ;
Ismail, Hussama ;
dos Santos Frutuoso, Adriano Bruno ;
Cordeiro, Lucas ;
de Lima Filho, Eddie Batista .
IEEE TRANSACTIONS ON RELIABILITY, 2018, 67 (04) :1420-1441
[9]   Model Checking Boot Code from AWS Data Centers [J].
Cook, Byron ;
Khazem, Kareem ;
Kroening, Daniel ;
Tasiran, Serdar ;
Tautschnig, Michael ;
Tuttle, Mark R. .
COMPUTER AIDED VERIFICATION, CAV 2018, PT II, 2018, 10982 :467-486
[10]  
Day MA, 2015, INT CONF UNMAN AIRCR, P426, DOI 10.1109/ICUAS.2015.7152319